[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kohls et al., 2022 - Google Patents

{VerLoc}: Verifiable Localization in Decentralized Systems

Kohls et al., 2022

View PDF
Document ID
10083272685449977275
Author
Kohls K
Diaz C
Publication year
Publication venue
31st USENIX Security Symposium (USENIX Security 22)

External Links

Snippet

We tackle the challenge of reliably determining the geolocation of nodes in decentralized networks, considering adversarial settings and without depending on any trusted landmarks. In particular, we consider active adversaries that control a subset of nodes, announce false …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Kohls et al. {VerLoc}: Verifiable Localization in Decentralized Systems
Poongodi et al. Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics
Sheikh et al. A comprehensive survey on VANET security services in traffic management system
Gondree et al. Geolocation of data in the cloud
Hopper et al. How much anonymity does network latency leak?
Wang et al. Defending against sybil devices in crowdsourced mapping services
Pang et al. Wifi-reports: Improving wireless network selection with collaboration
Wang et al. Ghost riders: Sybil attacks on crowdsourced mobile mapping services
Fiore et al. Discovery and verification of neighbor positions in mobile ad hoc networks
Gill et al. Dude, Where's That {IP}? Circumventing Measurement-based {IP} Geolocation
de Melo et al. UAVouch: a secure identity and location validation scheme for UAV-networks
US20120222089A1 (en) Network topology aided by smart agent download
Abdou et al. CPV: Delay-based location verification for the Internet
Kohls et al. On the Challenges of Geographical Avoidance for Tor.
Esposito et al. On data sovereignty in cloud-based computation offloading for smart cities applications
Abbas et al. Masquerading attacks detection in mobile ad hoc networks
EP2885902B1 (en) System and method for geothentication
Xu et al. Comprehensive review on misbehavior detection for vehicular ad hoc networks
Grover et al. Sybil attack detection in VANET using neighbouring vehicles
Grover et al. Sybil attack in vanets
Zhang et al. A robust and practical solution to ADS-B security against denial-of-service attacks
JP6556976B2 (en) Geocentration based on network ranging
Abdou et al. Location verification on the internet: Towards enforcing location-aware access policies over internet clients
Raponi et al. Road traffic poisoning of navigation apps: Threats and countermeasures
Ni et al. A mobile phone‐based physical‐social location proof system for mobile social network service